搜索结果: 1-4 共查到“军队指挥学 Threefish”相关记录4条 . 查询时间(0.062 秒)
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA
BLAKE Threefish Skein on FPGA
2013/4/18
The cryptographic hash functions BLAKE and Skein are built from the ChaCha stream cipher and the tweakable Threefish block cipher, respectively. Interestingly enough, they are based on the same arithm...
A New Related-Key Boomerang Distinguishing Attack of Reduced-Round Threefish-256
Skein Differential analysis Related key Boomerang attack
2012/3/27
On Nov 2007, NIST announced the SHA-3 competition to select a new hash standard as a replacement of SHA-2. On Dec 2010, five submissions have been selected as the final round candidates, including Ske...
Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish
secret-key cryptography Threefish Skein ARX cipher linear cryptanalysis
2010/7/13
The operations addition modulo 2^n and exclusive-or have recently been combined to obtain an efficient mechanism for nonlinearity in block cipher design. In this paper, we show that ciphers using this...
Improved Related-key Boomerang Attacks on Round-Reduced Threefish-512
Threefish-512 related-key boomerang attack modular differential
2009/11/18
Hash function Skein is one of the 14 NIST SHA-3 second
round candidates. Threefish is a tweakable block cipher as the core of
Skein, defined with a 256-, 512-, and 1024-bit block size. The 512-bit
...